General

  • Target

    INVOICE_73764683737____________.pdf.js

  • Size

    205KB

  • Sample

    210831-4g7hfdgcgx

  • MD5

    bdb8cdd6ed624b3dcbaab3d71df0f0e1

  • SHA1

    89318e4ecb5972b34aca0798dccc9f3c1eebcbce

  • SHA256

    519955052dbc780a8715890a897911b2131a541fa438cf4903a0e79e3d1976d2

  • SHA512

    e5a61f533688207e80e65b3fe02cb247cdce3225c055d7a36167742cb981ac932a221d85aa3bdf6ac6ed5a5b4d383b4c1e9e0c35b01263e4d0e25ca23d1fca81

Malware Config

Targets

    • Target

      INVOICE_73764683737____________.pdf.js

    • Size

      205KB

    • MD5

      bdb8cdd6ed624b3dcbaab3d71df0f0e1

    • SHA1

      89318e4ecb5972b34aca0798dccc9f3c1eebcbce

    • SHA256

      519955052dbc780a8715890a897911b2131a541fa438cf4903a0e79e3d1976d2

    • SHA512

      e5a61f533688207e80e65b3fe02cb247cdce3225c055d7a36167742cb981ac932a221d85aa3bdf6ac6ed5a5b4d383b4c1e9e0c35b01263e4d0e25ca23d1fca81

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks